Boesin: The attacker of Four.Meme profits by manipulating the order of transactions and the state of the liquidity pool

robot
Abstract generation in progress

Odaily Planet Daily News According to Boesin's analysis, the Four.Meme attacker used the 0x7f79f6df function of the contract 0x5c952063c7fc8610ffdb798152d69f0b9550762b to purchase a small amount of Token before the Token launch and sent the Token to the trading pool to add Liquidity to obtain Liquidity shares, resulting in the Token price in the trading pool being extremely high at this time. When the Token is officially launched, the project party will add Liquidity at the normal price, at which point a large amount of Token will be transferred to the trading pool, but the obtained Liquidity shares will not be high. Subsequently, the attacker removes Liquidity to obtain a large number of Tokens, and then dumps them to profit from it. Afterwards, Four.Meme stated that it will compensate affected users and provide a loss submission form to collect relevant information, and will announce the specific compensation plan in the future.

View Original
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments